HTTP
Protocol that encrypts data between a browser and a website
Firewall
Device/software that controls network traffic based on rules
Storage features
Functionalities of storage systems for efficient data storage, retrieval, and protection
Scalability
Ability to increase or decrease resources based on demand
SaaS
Software delivered over the internet
SSH
Cryptographic protocol for secure communication and remote command execution
DNS
System that translates domain names into IP addresses
Compression
Process of reducing the size of data by eliminating redundancy
High Availability
Ensures services stay up even if part of the system fails
IaaS
Virtual servers and storage rented from a provider
RDP
Microsoft protocol to remotely connect to a computer or VM
Deduplication
technique to remove duplicate copies of data
Cloud migration
Moving workloads and data from on-premises to the cloud
PaaS
Platform for developing and deploying applications
VPN
Secure, encrypted connection over public networks
Capacity on demand
Storage that can scale dynamically based on workload
Private Cloud
Cloud resources dedicated to one organization
Direct connect
Dedicated private network connection to a cloud provider
Hot and cold
Terms for data access frequency (frequently accessed vs rarely accessed)